DSA-679-1 toolchain-source -- insecure temporary files

Related Vulnerabilities: CVE-2005-0159  

Sean Finney discovered several insecure temporary file uses in toolchain-source, the GNU binutils and GCC source code and scripts. These bugs can lead a local attacker with minimal knowledge to trick the admin into overwriting arbitrary files via a symlink attack. The problems exist inside the Debian-specific tpkg-* scripts. For the stable distribution (woody) these problems have been fixed in version 3.0.4-1woody1. For the unstable distribution (sid) these problems have been fixed in version 3.4-5. We recommend that you upgrade your toolchain-source package.

Debian Security Advisory

DSA-679-1 toolchain-source -- insecure temporary files

Date Reported:
14 Feb 2005
Affected Packages:
toolchain-source
Vulnerable:
Yes
Security database references:
In Mitre's CVE dictionary: CVE-2005-0159.
More information:

Sean Finney discovered several insecure temporary file uses in toolchain-source, the GNU binutils and GCC source code and scripts. These bugs can lead a local attacker with minimal knowledge to trick the admin into overwriting arbitrary files via a symlink attack. The problems exist inside the Debian-specific tpkg-* scripts.

For the stable distribution (woody) these problems have been fixed in version 3.0.4-1woody1.

For the unstable distribution (sid) these problems have been fixed in version 3.4-5.

We recommend that you upgrade your toolchain-source package.

Fixed in:

Debian GNU/Linux 3.0 (woody)

Source:
http://security.debian.org/pool/updates/main/t/toolchain-source/toolchain-source_3.0.4-1woody1.dsc
http://security.debian.org/pool/updates/main/t/toolchain-source/toolchain-source_3.0.4-1woody1.tar.gz
Architecture-independent component:
http://security.debian.org/pool/updates/main/t/toolchain-source/toolchain-source_3.0.4-1woody1_all.deb

MD5 checksums of the listed files are available in the original advisory.